Attack, Solution and Verification for Shared Authorisation Data in TCG TPM
暂无分享,去创建一个
Mark Ryan | Liqun Chen | M. Ryan | Liqun Chen
[1] Mattia Monga,et al. Replay attack in TCG specification and solution , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[2] Liqun Chen,et al. Offline dictionary attack on TCG TPM weak authorisation data, and solution , 2009 .
[3] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[4] Carsten Rudolph,et al. Security Evaluation of Scenarios Based on the TCG's TPM Specification , 2007, ESORICS.
[5] Joachim Biskup,et al. Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings , 2007, ESORICS.
[6] V. Shoup,et al. Information technology-Security techniques-Encryption algorithms-Part 2 : Asymmetric Ciphers , 2004 .
[7] Amerson H Lin. Automated Analysis of Security APIs , 2005 .
[8] Ahmad-Reza Sadeghi,et al. Future of Trust in Computing , 2009 .